Weekend Sale - Limited Time 70% Discount Offer - Ends in 0d 00h 00m 00s - Coupon code: sntaclus

A user reports a hardware issue to the help desk. Which of the following should the help desk technician do first when responding to the user?

A.

Ask the user for the model number of the hardware.

B.

Offer a temporary replacement device to the user.

C.

Submit the issue to the manufacturer.

D.

Remotely install updates to the device driver.

A user requires local administrative access to a workstation. Which of the following Control Panel utilities allows the technician to grant access to the user?

A.

System

B.

Network and Sharing Center

C.

User Accounts

D.

Security and Maintenance

A customer calls a service support center and begins yelling at a technician about a feature for a product that is not working to the customer's satisfaction. This feature is not supported by the service support center and requires a field technician to troubleshoot. The customer continues to demand service. Which of the following is the BEST course of action for the support center representative to take?

A.

Inform the customer that the issue is not within the scope of this department.

B.

Apologize to the customer and escalate the issue to a manager.

C.

Ask the customer to explain the issue and then try to fix it independently.

D.

Respond that the issue is something the customer should be able to fix.

A kiosk, which is running Microsoft Windows 10, relies exclusively on a numeric keypad to allow customers to enter their ticket numbers but no other information. If the kiosk is idle for four hours, the login screen locks. Which of the following sign-on options would allow any employee the ability to unlock the kiosk?

A.

Requiring employees to enter their usernames and passwords

B.

Setting up facial recognition for each employee

C.

Using a PIN and providing it to employees

D.

Requiring employees to use their fingerprints

Which of the following is used to explain issues that may occur during a change implementation?

A.

Scope change

B.

End-user acceptance

C.

Risk analysis

D.

Rollback plan

Which of the following filesystem formats would be the BEST choice to ensure read and write compatibility of USB flash drives across several generations of Microsoft operating systems?

A.

APFS

B.

ext4

C.

CDFS

D.

FAT32

An implementation specialist is replacing a legacy system at a vendor site that has only one wireless network available. When the specialist connects to Wi-Fi. the specialist realizes the insecure network has open authentication. The technician needs to secure the vendor's sensitive data. Which of the following should the specialist do FIRST to protect the company's data?

A.

Manually configure an IP address, a subnet mask, and a default gateway.

B.

Connect to the vendor's network using a VPN.

C.

Change the network location to private.

D.

Configure MFA on the network.

A SOHO client is having trouble navigating to a corporate website. Which of the following should a technician do to allow access?

A.

Adjust the content filtering.

B.

Unmap port forwarding.

C.

Disable unused ports.

D.

Reduce the encryption strength

A technician receives a call from a user who is unable to open Outlook. The user states that Outlook worked fine yesterday, but the computer may have restarted sometime overnight. Which of the following is the MOST likely reason Outlook has stopped functioning?

A.

Spam filter installation

B.

Invalid registry settings

C.

Malware infection

D.

Operating system update

A user receives the following error while attempting to boot a computer.

BOOTMGR is missing

press Ctrl+Alt+Del to restart

Which of the following should a desktop engineer attempt FIRST to address this issue?

A.

Repair Windows.

B.

Partition the hard disk.

C.

Reimage the workstation.

D.

Roll back the updates.

A technician is troubleshooting a PC that has been performing poorly. Looking at the Task Manager, the technician sees that CPU and memory resources seem fine, but disk throughput is at 100%.

Which of the following types of malware is the system MOST likely infected with?

A.

Keylogger

B.

Rootkit

C.

Ransomware

D.

Trojan

A user is no longer able to start the OS on a computer and receives an error message indicating there is no OS found. A technician reviews the audit logs and notes that the user's system posted a S.M.A.R.T. error just days before this issue. Which of the following is the MOST likely cause of this issue?

A.

Boot order

B.

Malware

C.

Drive failure

D.

Windows updates

Which of the following features allows a technician to configure policies in a Windows 10 Professional desktop?

A.

gpedit

B.

gpmc

C.

gpresult

D.

gpupdate

A technician is editing the hosts file on a few PCs in order to block certain domains. Which of the following would the technician need to execute after editing the hosts file?

A.

Enable promiscuous mode.

B.

Clear the browser cache.

C.

Add a new network adapter.

D.

Reset the network adapter.

A systems administrator is creating periodic backups of a folder on a Microsoft Windows machine. The source data is very dynamic, and files are either added or deleted regularly. Which of the following utilities can be used to ‘mirror the source data for the backup?

A.

copy

B.

xcopy

C.

robocopy

D.

Copy-Item